Time limit: 0
Quiz Summary
0 of 12 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 12 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 12
1. Question
Which of the following options can be used to provide wireless connectivity to a non-wireless device?
CorrectIncorrect -
Question 2 of 12
2. Question
Type the frequency band that commonly used for Wi-Fi. (Type only the number)
-
Wi-Fi commonly uses the 2.4GHz and GHz bands.
CorrectIncorrect -
-
Question 3 of 12
3. Question
When APs are placed at different geographic locations, they can all be interconnected by a switched infrastructure. The 802.11 standard calls this an extended service set (ESS).
CorrectIncorrect -
Question 4 of 12
4. Question
Which of the following IEEE 802.11 Wi-Fi standards use the 2.4 GHz band? (Choose all that apply)
CorrectIncorrect -
Question 5 of 12
5. Question
Which of the following IEEE 802.11 Wi-Fi standards use the 5 GHz band? (Choose all that apply)
CorrectIncorrect -
Question 6 of 12
6. Question
A lightweight access point in which one of the following architectures participate?
CorrectIncorrect -
Question 7 of 12
7. Question
Which of the following wireless security tools is used to protect the integrity of data in a wireless frame?
CorrectIncorrect -
Question 8 of 12
8. Question
Which one of the following is a wireless encryption method that is not recommended for use due to vulnerability issues?
CorrectIncorrect -
Question 9 of 12
9. Question
You have been tasked to create a new WLAN with the controller GUI. Which of the following parameters are necessary to create the WLAN? (Choose all that apply.)
CorrectIncorrect -
Question 10 of 12
10. Question
Which of the following options is the maximum number of WLANs you can configure on a Cisco wireless controller?
CorrectIncorrect -
Question 11 of 12
11. Question
Which of the following controller interfaces map a WLAN to a VLAN?
CorrectIncorrect -
Question 12 of 12
12. Question
Which is the most preferred and secure way of connecting to a WLC GUI to configure a new WLAN?
CorrectIncorrect